THM
Risk Management
Risk Assement
100

This is the probability that a threat will exploit a vulnerability and cause harm to an organization.

What is risk?

100

When risk management activities are ongoing and repeatedly reviewed to improve results, this concept is being applied.

What is continious improvement?

100

When the RM team decides whether analyzed risk levels are acceptable, they are performing this step.

What is risk evaluation?

200

A weakness in a system that an attacker can exploit is called this.

What is a vulnerability?

200

The five stages of the RM framework include executive support, design, implementation, monitoring and review, and this final stage.

What is continuous improvement?

200

In risk determination, risk is commonly calculated by multiplying likelihood by this factor.

What is impact?

300

Hacking, ransomware groups, and cyberattacks are examples of this.

What is a threat?

300

The RM framework focuses on planning, while the RM process focuses on this.

What is implementation (or doing)?

300

This phase of the RM process includes identifying assets, threats, and vulnerabilities.

What is risk identification?

400

Monitoring whether a control is still working properly over time focuses on this area.

What is effectiveness?

400

The risk that remains after controls have been implemented is called this.

What is residual risk?

400

A grid that combines threats, vulnerabilities, and assets to analyze exposure is called this worksheet.

What is a TVA worksheet?

500

In risk framing, this refers to the acceptable level of risk an organization is willing to take.

What is risk tolerance?

500

This group provides executive oversight and support for the organization’s risk management program.

What is executive governance (or the governance group)?

500

Combining smaller risks into broader categories to simplify analysis is called this.

What is aggregation?

M
e
n
u